User authentication for a user device can leverage one or more fingerprint sensor regions capable of detecting and/or recognizing a user's fingerprints. The user can define a fingerprint gesture or sequence of fingerprint gestures as a passcode, with access to a protected function being conditional on the user performing the defined fingerprint gesture or sequence of fingerprint gestures. Different fingerprint gestures or fingerprint gesture sequences can invoke or authorize different functions of the device. Fingerprint gestures from two or more users in the same location or in different locations can be used to unlock a protected function of a device.
Legal claims defining the scope of protection. Each claim is shown in both the original legal language and a plain English translation.
1. A device comprising: a fingerprint sensor region; a camera; and one or more processors configured to: detect a first fingerprint gesture via the fingerprint sensor region, the first fingerprint gesture including a touch by at least one finger on the fingerprint sensor region; detect a second fingerprint gesture via the fingerprint sensor region, the second fingerprint gesture including a touch by at least one finger on the fingerprint sensor region; capture a digital image via the camera; and authorize an access to a function of the device based at least on all of: a fingerprint associated with the first fingerprint gesture detected, a fingerprint associated with the second fingerprint gesture detected, and the digital image captured.
This invention relates to a device with enhanced security features combining fingerprint authentication and image capture for access control. The device includes a fingerprint sensor region and a camera, along with processing components. The system detects two distinct fingerprint gestures, each involving a touch by at least one finger on the sensor region. These gestures are analyzed to extract fingerprint data. Additionally, the device captures a digital image using the camera. Access to a device function is authorized only if all three elements—the fingerprints from both gestures and the captured image—are validated. This multi-factor approach improves security by requiring multiple biometric inputs and an additional visual verification step, reducing the risk of unauthorized access. The system ensures that both fingerprint data and contextual image information are used in the authentication process, providing a more robust security mechanism compared to single-factor authentication methods. The device is designed to enhance security in scenarios where traditional single-factor authentication may be insufficient, such as in high-security applications or environments requiring stringent access control.
2. The device of claim 1 , wherein the one or more processors are further configured to: determine facial features in the digital image captured; and authorize the access to the function of the device based additionally at least on the facial features determined.
A facial recognition system for secure device access involves a computing device with one or more processors and a camera. The device captures a digital image of a user's face and analyzes the image to determine facial features. The system then authorizes access to a device function based on these facial features, ensuring secure authentication. The facial recognition process may include comparing the detected features against stored biometric data to verify identity. This method enhances security by requiring both facial recognition and additional authentication factors, reducing unauthorized access risks. The system is designed for devices requiring high-security access control, such as smartphones, laptops, or secure terminals. The facial recognition algorithm processes the captured image to extract key facial landmarks, such as eye positions, nose shape, and mouth structure, to create a unique biometric profile. The device then cross-references this profile with authorized user data to grant or deny access. This approach improves upon traditional password-based systems by leveraging biometric authentication, which is more difficult to bypass. The system may also incorporate liveness detection to prevent spoofing attempts using static images or masks. Overall, the invention provides a robust, multi-factor authentication solution for secure device access.
3. The device of claim 1 , wherein the one or more processors are further configured to authorize the access to the function of the device based additionally on at least matching the fingerprint associated with the first fingerprint gesture detected to a previously registered fingerprint and matching the fingerprint associated with the second fingerprint gesture detected to a previously registered fingerprint.
This invention relates to a security device that uses biometric authentication, specifically fingerprint gestures, to control access to device functions. The device includes one or more processors and a touch-sensitive surface capable of detecting fingerprint gestures. The processors are configured to detect a first fingerprint gesture and a second fingerprint gesture performed on the touch-sensitive surface. The device authorizes access to a function only if both gestures match previously registered fingerprints. This dual-fingerprint verification enhances security by requiring two distinct biometric confirmations, reducing the risk of unauthorized access. The system may involve comparing the detected fingerprint patterns against stored templates to ensure accuracy. The touch-sensitive surface could be part of a display or a dedicated sensor area. The device may also include additional security measures, such as encryption or multi-factor authentication, to further protect sensitive functions. This approach is particularly useful in high-security applications where single-factor authentication is insufficient.
4. The device of claim 1 , wherein the one or more processors are further configured to activate the camera of the device to begin capturing the digital image in response to detecting the first fingerprint gesture via the fingerprint sensor region.
A device includes a fingerprint sensor region and a camera, where the device is configured to detect a first fingerprint gesture via the fingerprint sensor region. The device further includes one or more processors that activate the camera to begin capturing a digital image in response to detecting the first fingerprint gesture. The device may also include a display and a housing with a front surface, where the fingerprint sensor region is integrated into the housing and the camera is positioned on the front surface. The device may be configured to detect a second fingerprint gesture via the fingerprint sensor region and adjust a setting of the camera based on the second fingerprint gesture. The setting may include focus, zoom, or exposure. The device may also include a memory storing instructions that, when executed by the processors, cause the device to perform these operations. The fingerprint sensor region may be a capacitive sensor or an optical sensor. The device may be a smartphone, tablet, or other portable electronic device. The camera activation and setting adjustments are triggered solely by fingerprint gestures, providing a hands-free and secure method for controlling the camera. This technology addresses the need for intuitive, secure, and efficient camera control in portable devices, particularly in scenarios where touchscreen or button inputs are impractical.
5. The device of claim 1 , wherein the one or more processors are further configured to: perform facial-feature recognition on the digital image captured; and determine whether facial features recognized in the digital image captured match previously registered facial-features of a user associated with the fingerprint associated with the first fingerprint gesture detected.
A system for biometric authentication combines fingerprint and facial recognition to enhance security. The system includes a computing device with one or more processors, a fingerprint sensor, and a camera. The processors are configured to detect a fingerprint gesture from the sensor, capture a digital image of the user's face using the camera, and perform facial-feature recognition on the captured image. The system then compares the recognized facial features against previously registered facial features associated with the user linked to the detected fingerprint. This dual-authentication approach ensures that both the fingerprint and facial features match the registered user, reducing the risk of unauthorized access. The system may be used in security applications, such as unlocking devices, accessing secure systems, or verifying user identity in transactions. The integration of multiple biometric modalities improves accuracy and security compared to single-factor authentication methods.
6. A method comprising: detecting a fingerprint via a first fingerprint sensor region; detecting a fingerprint via a second fingerprint sensor region that is not the first fingerprint sensor region; obtaining a digital image via a camera; authorizing an access to a function of a device based at least on all of: the fingerprint detected via the first fingerprint sensor region, the fingerprint detected via the second fingerprint sensor region, and the digital image obtained; and wherein the method is performing by the device, the device having the first fingerprint sensor region, the second fingerprint sensor region and including the camera.
This invention relates to multi-factor authentication systems for securing device access. The problem addressed is the need for enhanced security beyond single-factor authentication, such as a single fingerprint scan or image capture, to prevent unauthorized access. The solution involves a device with at least two distinct fingerprint sensor regions and a camera, which together enable a multi-modal authentication process. The method detects a fingerprint via a first sensor region and a separate fingerprint via a second sensor region, ensuring two distinct biometric inputs. Additionally, a digital image is captured via the device's camera. Access to a device function is authorized only if all three inputs—the two fingerprints and the image—are successfully verified. This multi-factor approach increases security by requiring multiple independent biometric and visual confirmations, reducing the risk of spoofing or unauthorized access. The device integrates the sensors and camera, ensuring seamless and secure authentication. This method is particularly useful for high-security applications where single-factor authentication is insufficient.
7. The method of claim 6 , further comprising: determining facial features in the digital image obtained; and authorizing the access to the function of the device based additionally at least on the facial features determined.
This invention relates to a method for controlling access to a device function using facial recognition. The method addresses the problem of unauthorized access to device functions by implementing a multi-factor authentication process that includes facial feature analysis. The system captures a digital image of a user attempting to access a device function, such as a smartphone or secure system. The method first verifies the user's identity by comparing the captured image to stored biometric data. If the initial verification is successful, the method further analyzes the captured image to determine specific facial features, such as eye position, nose shape, or mouth structure. Access to the device function is then authorized only if the detected facial features match predefined criteria, ensuring an additional layer of security. This approach enhances security by reducing the risk of unauthorized access through spoofing or impersonation, as it requires both general facial recognition and specific feature matching. The method is particularly useful in applications where high-security authentication is required, such as financial transactions, secure logins, or restricted device access.
8. The method of claim 6 , further comprising authorizing the access to the function of the device based additionally on at least matching the fingerprint detected via the first fingerprint sensor region to a previously registered fingerprint and matching the fingerprint detected via the second fingerprint sensor region.
A method for enhancing device security by requiring multi-point fingerprint authentication involves detecting fingerprints at two distinct sensor regions on a device. The first fingerprint sensor region captures a fingerprint, which is compared to a previously registered fingerprint. Simultaneously or sequentially, a second fingerprint sensor region captures another fingerprint, which is also compared to a registered fingerprint. Access to a device function is authorized only if both detected fingerprints match their respective registered fingerprints. This dual-fingerprint verification process improves security by requiring authentication from two separate locations, reducing the risk of unauthorized access. The method can be applied to devices with multiple fingerprint sensors, such as smartphones, tablets, or other electronic devices, to ensure that only authorized users can access sensitive functions. The system may include additional security measures, such as liveness detection or multi-factor authentication, to further enhance protection. The method is particularly useful in scenarios where high-security access is required, such as financial transactions, biometric logins, or sensitive data access.
9. The method of claim 6 , further comprising activating the camera of the device to begin capturing the digital image based at least on the detecting the fingerprint via the first fingerprint sensor region.
A method for enhancing security and user convenience in electronic devices involves integrating a fingerprint sensor with a camera activation system. The device includes a fingerprint sensor with at least two distinct sensing regions: a first region for detecting a fingerprint and a second region for verifying the detected fingerprint. When a user places their finger on the first region, the device detects the fingerprint and, based on this detection, automatically activates the camera to begin capturing digital images. The second region may be used to confirm the fingerprint's authenticity before granting access to the camera or other device functions. This approach streamlines the authentication process by eliminating the need for separate steps, reducing user effort while maintaining security. The method ensures that the camera is only activated upon successful fingerprint detection, preventing unauthorized access. The system may also include additional security measures, such as requiring the fingerprint to be verified in the second region before full camera functionality is enabled. This integration improves usability by automating camera activation while ensuring that only authorized users can operate the device's imaging capabilities.
10. The method of claim 6 , further comprising: performing facial-feature recognition on the digital image obtained; and determining whether facial features recognized in the digital image captured match previously registered facial-features of a user associated with the fingerprint detected via the first fingerprint sensor region.
This invention relates to biometric authentication systems that combine fingerprint and facial recognition for secure access control. The system addresses the need for enhanced security by verifying multiple biometric identifiers before granting access. The method involves capturing a digital image of a user's face using an imaging device and performing facial-feature recognition to extract distinctive facial characteristics. The system then compares these recognized features against previously registered facial data associated with a user whose fingerprint was detected via a first fingerprint sensor region. If the facial features match the registered data, the authentication process is completed successfully. The system ensures that both biometric identifiers—fingerprint and facial recognition—are validated before authorizing access, improving security by reducing the risk of unauthorized entry. The method may be integrated into devices such as smartphones, security systems, or access control terminals where multi-factor authentication is required. The combination of fingerprint and facial recognition provides a robust verification process that is both secure and user-friendly.
11. The method of claim 6 , further comprising: measuring a facial pulse based on a set of digital images captured via the camera, the set of digital images captured including the digital image captured; measuring a finger pulse via the first fingerprint sensor region; and authorizing the access to the function of the device based additionally at least on both the facial pulse and the finger pulse measured.
This invention relates to biometric authentication systems that enhance security by combining facial and fingerprint pulse measurements. The problem addressed is the vulnerability of traditional biometric authentication methods to spoofing attacks, such as using photographs or fake fingerprints. The solution involves capturing a set of digital images of a user's face, including at least one image used for facial recognition, and analyzing these images to measure the user's facial pulse. Additionally, the system measures the user's finger pulse using a fingerprint sensor. Access to a device function is authorized only if both the facial and finger pulse measurements match expected physiological patterns, ensuring the user is a live person. The facial pulse measurement may involve analyzing subtle changes in skin color or texture across multiple images to detect blood flow variations. The fingerprint sensor region captures both the fingerprint pattern and pulse data, which may be derived from variations in sensor readings over time. By requiring both biometric pulses to align with expected physiological responses, the system improves resistance to spoofing and enhances authentication security.
12. The method of claim 6 , wherein the first fingerprint sensor region is incorporated into a control button of the device.
A method for integrating a fingerprint sensor into a control button of an electronic device addresses the need for secure and convenient user authentication in portable devices. The method involves embedding a fingerprint sensor within a control button, such as a power button or home button, to enable biometric authentication without requiring a separate sensor area. This integration allows users to authenticate by placing a finger on the button, streamlining the authentication process while maintaining security. The sensor captures fingerprint data when the button is pressed, and the device processes this data to verify the user's identity. This approach reduces the need for additional hardware, conserves space, and enhances the device's ergonomic design by combining authentication and control functions into a single component. The method is particularly useful in smartphones, tablets, and other portable devices where space efficiency and user convenience are critical. By incorporating the sensor into an existing button, the device maintains a sleek design while providing robust security features. The technique ensures reliable fingerprint recognition even during button presses, ensuring seamless and secure access to the device.
13. The method of claim 6 , wherein the first fingerprint sensor region is incorporated into a touch screen display of the device.
A method for integrating a fingerprint sensor into a touch screen display of an electronic device addresses the challenge of providing secure biometric authentication while maintaining a seamless user interface. The method involves embedding a first fingerprint sensor region within the touch screen display, allowing users to authenticate by placing a finger on the display surface. This eliminates the need for a separate physical fingerprint sensor, reducing device complexity and improving aesthetics. The touch screen display may include additional sensor regions for enhanced functionality, such as multi-point authentication or gesture recognition. The method ensures that the fingerprint sensor operates reliably within the display, maintaining accuracy and responsiveness. By integrating the sensor into the display, the device achieves a more compact and modern design while preserving security features. This approach is particularly useful in smartphones, tablets, and other portable devices where space optimization and user experience are critical. The method may also include calibration techniques to adapt the sensor to varying environmental conditions, ensuring consistent performance. Overall, the invention provides a streamlined solution for biometric authentication in touch screen devices.
14. The method of claim 6 , wherein the detecting the fingerprint via the first fingerprint sensor region is performed in response to an actuation of a control button of the device, the first fingerprint sensor region incorporated into the control button of the device.
A method for fingerprint detection in electronic devices addresses the challenge of integrating biometric authentication into compact form factors, particularly where space constraints limit traditional sensor placement. The method involves detecting a user's fingerprint via a first fingerprint sensor region embedded within a control button of the device. This sensor region is specifically incorporated into the button, enabling seamless and intuitive authentication during button actuation. The approach leverages the existing button structure to house the sensor, eliminating the need for additional dedicated fingerprint scanning areas. This integration enhances user convenience by allowing authentication during routine interactions, such as powering on the device or launching applications. The method ensures secure and efficient biometric verification while optimizing device design by utilizing an existing hardware component. The solution is particularly valuable for portable devices where space efficiency and ergonomic design are critical.
15. The method of claim 6 , wherein the detecting the fingerprint via the first fingerprint sensor region is performed in response to a touch by at least one finger on the first fingerprint sensor region of the device.
A method for fingerprint detection in electronic devices addresses the challenge of securely and efficiently authenticating users through fingerprint recognition. The method involves a device with a first fingerprint sensor region that detects a fingerprint when a user touches it with at least one finger. This detection triggers the fingerprint recognition process, enabling secure access or authentication. The method may also include additional steps such as capturing the fingerprint image, processing the image to extract unique features, and comparing these features against stored templates to verify identity. The system may further integrate with other security measures or user interfaces to enhance functionality. The approach ensures reliable fingerprint authentication by responding directly to physical touch input, improving user convenience and security in devices like smartphones, tablets, or other electronic systems. The method may also support multi-finger or multi-touch scenarios for advanced authentication protocols.
16. One or more non-transitory computer-readable media storing one or more programs for execution by one or more processors of a device having a fingerprint sensor region, the device including or being operatively coupled to a camera, the one or more programs including instructions which, when executed by the one or more processors of the device, cause the device to perform: detecting a first fingerprint gesture via the fingerprint sensor region, the first fingerprint gesture including a touch by at least one finger on the fingerprint sensor region; detecting a second fingerprint gesture via the fingerprint sensor region, the second fingerprint gesture including a touch by at least one finger on the fingerprint sensor region; capturing a digital image via the camera; and authorizing an access to a function of the device based at least on all of: the first fingerprint gesture detected, the second fingerprint gesture detected, and the digital image captured.
The invention relates to a security system for electronic devices that combines fingerprint authentication with image capture to authorize access to device functions. The system addresses the need for enhanced security beyond traditional single-factor authentication methods, such as standalone fingerprint or password-based systems, which are vulnerable to spoofing or unauthorized access. The device includes a fingerprint sensor region and a camera, either integrated or externally connected. The system detects a first fingerprint gesture, where a finger touches the sensor, followed by a second fingerprint gesture, also involving a finger touch on the sensor. After these gestures are recorded, the device captures a digital image using the camera. Access to a device function is granted only if all three elements—the first fingerprint gesture, the second fingerprint gesture, and the captured image—are successfully verified. This multi-factor approach improves security by requiring both biometric and visual authentication, reducing the risk of unauthorized access. The system is particularly useful for devices where sensitive functions require robust authentication, such as smartphones, tablets, or secure workstations.
17. The one or more non-transitory computer-readable media of claim 16 , the one or more programs including instructions which, when executed by the one or more processors of the device, further cause the device to perform: activating the camera to begin capturing the digital image in response to detecting the second fingerprint gesture via the fingerprint sensor region.
A system and method for controlling a device using fingerprint gestures involves a device with a fingerprint sensor and a camera. The device detects a first fingerprint gesture via the fingerprint sensor region, which triggers the activation of the camera. The device then detects a second fingerprint gesture via the same sensor region, which causes the camera to begin capturing a digital image. The system may also include additional features such as adjusting camera settings, displaying a preview of the captured image, or storing the image in a memory. The fingerprint gestures may involve swiping, tapping, or other predefined patterns on the fingerprint sensor. This technology addresses the need for secure and convenient camera activation, reducing the risk of accidental captures while providing quick access to imaging functions. The system ensures that only authorized users can activate the camera, enhancing privacy and security. The method may also include additional steps such as authenticating the user based on the fingerprint gesture before allowing camera activation. The device may be a smartphone, tablet, or other portable electronic device equipped with a fingerprint sensor and a camera.
18. The one or more non-transitory computer-readable media of claim 16 , the one or more programs including instructions which, when executed by the one or more processors of the device, further cause the device to perform: recognizing facial-features in the digital image captured; and determining whether the facial-features recognized in the digital image captured match previously registered facial-features of a user associated with a fingerprint associated with the first fingerprint gesture detected.
A system for biometric authentication combines fingerprint and facial recognition to enhance security. The system captures a digital image of a user's face and analyzes it to recognize facial features. These features are compared against previously registered facial data linked to a specific user. The system also detects a fingerprint gesture, such as a swipe or touch, and associates it with the user's registered fingerprint data. The authentication process involves verifying that the detected facial features match the registered facial data tied to the fingerprint gesture. This dual-factor approach improves security by requiring both biometric inputs to confirm identity, reducing the risk of unauthorized access. The system operates on a device with one or more processors and non-transitory computer-readable media storing executable instructions. The facial recognition and fingerprint matching processes are performed by the device's processors, ensuring real-time authentication without relying on external servers. This method is particularly useful in applications where high-security authentication is required, such as mobile devices, secure access systems, or financial transactions.
19. The one or more non-transitory computer-readable media of claim 16 , the one or more programs including instructions which, when executed by the one or more processors of the device, further cause the device to perform: authorizing the access to the function of the device based additionally on at least matching a fingerprint associated with the first fingerprint gesture detected to a previously registered fingerprint and matching a fingerprint associated with the second fingerprint gesture detected to a previously registered fingerprint.
This invention relates to secure access control systems for electronic devices using biometric authentication, specifically fingerprint-based gestures. The problem addressed is enhancing security by requiring multiple distinct fingerprint gestures for authorization, reducing the risk of unauthorized access through single-point failures or spoofing. The system involves a device with one or more processors and non-transitory computer-readable media storing programs. The device detects a first fingerprint gesture and a second fingerprint gesture, each involving unique fingerprint data. The system authorizes access to a device function only if both gestures match previously registered fingerprints. This dual-fingerprint verification ensures that access is granted solely to authorized users who can provide both required biometric inputs, significantly improving security over single-fingerprint systems. The solution is particularly useful for high-security applications where unauthorized access could have serious consequences, such as financial transactions, sensitive data access, or device unlocking. The invention leverages existing fingerprint sensing technology but introduces a novel multi-gesture authentication method to mitigate vulnerabilities in traditional single-fingerprint systems.
20. The one or more non-transitory computer-readable media of claim 16 , the one or more programs including instructions which, when executed by the one or more processors of the device, further cause the device to perform: activating the camera to begin capturing the digital image in response to detecting the first fingerprint gesture via the fingerprint sensor region.
A system for secure device activation using biometric authentication involves a computing device with a fingerprint sensor and a camera. The device includes one or more processors and non-transitory computer-readable media storing programs executed by the processors. The system detects a first fingerprint gesture via a fingerprint sensor region, which triggers the activation of the camera to begin capturing a digital image. The fingerprint sensor region is configured to detect biometric input, such as a fingerprint, to authenticate a user. The camera activation is directly responsive to the detected fingerprint gesture, ensuring that image capture is initiated only after successful biometric verification. This method enhances security by linking camera functionality to authenticated user interactions, preventing unauthorized access or use of the camera. The system may also include additional authentication steps or gestures to further secure device operations. The overall approach integrates biometric authentication with device hardware control to improve security and user convenience.
Cooperative Patent Classification codes for this invention.
November 29, 2018
April 14, 2020
Discover thousands of AI-analyzed patents with comprehensive breakdowns, multimedia content, and expert insights.